A study conducted by IT research company Wisegate found that BYOD practices and cloud technology are the two new threats that make IT departments worry. Out of the hundreds of senior IT professionals surveyed, 51% said that BYOD policies were a top risk for their company. Only 32% of respondents said data breaches and malware were a top security threat. Data breaches and malware are still considered risks that IT professionals are worried about. These data breaches can occur through insecure BYOD policies.
Some companies already insist that employees refrain from using personal devices for work-related companies. It is likely that a personal device won’t have the same safeguards and security protections that a company device has. For example, some employees do not have the user authorization to download third-party software to their company devices. However, on a personal device, employees can download as many apps and programs as they want. If an employee accidentally downloaded malware onto a personal device that they also use for work, they could compromise their company’s confidential information.
One way for companies to prevent malware from being downloaded onto devices is by monitoring network devices. Companies can monitor their network devices for unauthorized software. However, the issue is that companies cannot prevent employees from downloading certain apps onto their personal devices. Companies cannot monitor personal devices like they are company property, or hold the devices up to company security standards. Employees like being able to use a single device for work and personal purposes, but this policy does not always benefit the company.
Although some companies are moving away from BYOD policies, some government agencies are implementing them. This summer, the Department of Defense plans to launch a BYOD pilot program at the Pentagon. Staff at the Department of Defense headquarters will help evaluate the security of personal devices being used for work purposes. The Pentagon has already implemented a program involving the use of classified on and unclassified devices. Unclassified devices allow Pentagon employees to use their personal phones for business-related purposes. Around 1,500 unclassified devices are in use now, and Pentagon officials hope to distribute more.
With cloud platforms, the risk is that large amounts of data can be affected by hackers. It is harder to break into a cloud platform and infect it with malware than it is to compromise an endpoint. When a hacker manages to compromise a company’s cloud infrastructure, the scale of the breach is larger. As companies rely more on technology, they need to make sure their networks are secure.
The top priority concern for many IT security professionals is information protection. According to Wisegate’s survey, nearly a third of respondents plan to prioritize information protection over the next few years.
EiQ Networks SOCVue security monitoring service allows companies to evaluate the security of all of their endpoints across all networks. With 24/7 network monitoring, company CISOs can know when a security incident has occurred. EiQ’s security experts are always available to help remediate security issues. When a cyber security team is available 24/7 to respond to any security concerns, companies can implement successful BYOD policies without worry.